{"response":{"docs":[{"system_create_dtsi":"2020-05-15T23:04:33Z","system_modified_dtsi":"2020-05-15T23:15:48Z","has_model_ssim":["Article"],"id":"dv13zv62n","accessControl_ssim":["b7555794-f737-4fd6-8fd5-3b82b0269623"],"hasRelatedMediaFragment_ssim":["pr76f495c"],"hasRelatedImage_ssim":["pr76f495c"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Scraping The Deep Web: A 3-Dimensional Framework For Cyber-Threat Intelligence"],"date_uploaded_dtsi":"2020-05-15T23:04:33Z","date_modified_dtsi":"2020-05-15T23:04:33Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/sasd-4z96"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Adewale, Adewopo Victor","Gonen, Bilal"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Cyberspace is one of the most complex systems ever built by humans. The utilization of cybertechnology resources are used ubiquitously by many, but sparsely understood by the majority of the users. In the past, cyberattacks were usually orchestrated in a random pattern of attack to lure unsuspecting targets. However, the cyber virtual environment is an ecosystem that provided a platform for an organized and sophisticated approach to launch an attack against a specific target group or organization by nefarious actors. In 2019, the average cost of cyber-attack in the US was about $1.6 million. This paper proposes a 3D framework to signal new threat alert before the actual occurrence of the threat on the surface web to alert cybersecurity experts and law enforcement agencies in preventive measures or means of mitigating the severity of damage caused by cyberattacks. The methodology combines information extracted from the deep web through a smart web crawler with socio-personal and technical indicators from twitter which is mapped with OTX (Open Threat Exchange). The OTX is an open-source cyber threat platform managed by security experts. The OTX endpoint security tool(OTX python SDK) will be used to identify a new type of cyber threats. The effectiveness of the framework will be tested using the machine learning algorithm precision-recall rate."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/13 "],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/pr76f495c?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["pr76f495c"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["pr76f495c"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SCRAPING THE DEEP WEB A 3DIMENSIONAL FRAMEWORK FOR CYBERTHREAT INTELLIGENCE","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/dv13zv62n"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086680855478272,"timestamp":"2021-04-15T06:26:20.247Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Article","hits":1,"label":"Article"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Adewale, Adewopo Victor","hits":1,"label":"Adewale, Adewopo Victor"},{"value":"Gonen, Bilal","hits":1,"label":"Gonen, Bilal"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Information Technology","hits":1,"label":"Information Technology"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Education, Criminal Justice, and Human Services","hits":1,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"- School of Information Technology","hits":1,"label":"- School of Information Technology"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":1,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":1,"label":"University of Cincinnati"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2020-04-14","hits":1,"label":"2020-04-14"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"ws859g993","hits":1,"label":"ws859g993"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":1,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":null,"prev_page":null,"total_pages":1,"limit_value":10,"offset_value":0,"total_count":1,"first_page?":true,"last_page?":true}}}